vim-filesystem-2:8.2-54.oe1 >  A cLW^^fI'S=&M@x̥ $c *c N2 9P(2%6_!Ɖ{ Y6V>6aE46s2n`Ďym6m'G~id/NzjRI$$fH9Xgx$I4&-"7ktd5X`p DTO8t87db09742905629849c1645c8fdcd68ffad5590daf445dcf5f3a1e5876696ebc0da5d23e7200adeb6ff4b55a506b9b7474eb9efd-TcLW^^fqr}J쒊x#0.h^U=:_Mg9fxW'!/S$)c[56H0$ߎ-`* kI9Xa\[HDF(۹ۂK?`bӌ5+!Vo$Gxrg8Cds@۳Y/Qc10KZEKz?SvB Pdz ʱC}po"^*;Z>mkJL4͖|>p='?'d  4`d     x  (Jd[(w859T5:g5F"G"0H"I#X#8Y#<\#L]#^$b$c%d&1e&6f&9l&;t&Xu&v'@z'P'`'d'j'Cvim-filesystem8.254.oe1The vim filesystem.This package contains the vim filesystem.cK#obs-worker1640081563-aarch64-0008openEuler:20.03:LTS:SP1 / standard_aarch64http://openeuler.orgVim and MIThttp://openeuler.orgUnspecifiedhttp://www.vim.orglinuxnoarchAAAAAAAAAAAAAAAAAA큤AAAAAAAAAAcKcKcKcKcKcKcKcKcKcKcKcKcKcKcKcKcKcKcKcKcKcKcKcKcKcKcKcKcK@rootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootvim-8.2-54.oe1.src.rpmvim-filesystem    rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)3.0.4-14.6.0-14.0-15.2-14.15.1c @c @cob)bbb@bڑ@b@bVbγbγbbb'b'b>b@bUbb@bbb&bbb@b@b - 2:8.2-54shixuantong - 2:8.2-53shixuantong - 2:8.2-52shixuantong - 2:8.2-51dongyuzhen - 2:8.2-50shixuantong - 2:8.2-49shixuantong - 2:8.2-48dongyuzhen - 2:8.2-47shixuantong - 2:8.2-46shangyibin - 2:8.2-45yanglongkang - 2:8.2-44shixuantong - 2:8.2-43shixuantong - 2:8.2-42tianwei - 2:8.2-41renhongxun - 2:8.2-40shixuantong - 2:8.2-39shixuantong - 2:8.2-38renhongxun - 2:8.2-37liukuo - 2:8.2-36dongyuzhen - 2:8.2-35shixuantong - 2:8.2-34tianwei - 2:8.2-33renhongxun - 2:8.2-32renhongxun - 2:8.2-31renhongxun - 2:8.2-30shixuantong - 2:8.2-29shixuantong - 2:8.2-28shixuantong - 2:8.2-27shixuantong - 2:8.2-26shangyibin - 2:8.2-25yuanxin - 2:8.2-24yuanxin - 2:8.2-23shixuantong - 2:8.2-22yuanxin - 2:8.2-21yuanxin - 2:8.2-20yuanxin - 2:8.2-19yuanxin - 2:8.2-18yuanxin - 2:8.2-17tianwei - 2:8.2-16shixuantong - 2:8.2-15yuanxin - 2:8.2-14guozhaorui - 2:8.2-13guozhaorui - 2:8.2-12yuanxin - 2:8.2-11yuanxin - 2:8.2-10shixuantong - 2:8.2-9shixuantong - 2:8.2-8shixuantong - 2:8.2-7shixuantong - 2:8.2-6shixuantong - 2:8.2-5shixuantong - 2:8.2-4shixuantong - 2:8.2-3shixuantong - 2:8.2-2- Type:CVE - ID:CVE-2022-3016 - SUG:NA - DESC:fix CVE-2022-3016- Type:CVE - ID:CVE-2022-2980 - SUG:NA - DESC:fix CVE-2022-2980- Type:CVE - ID:CVE-2022-2923 CVE-2022-2946 - SUG:NA - DESC:fix CVE-2022-2923 CVE-2022-2946- Type:CVE - ID:CVE-2022-2845 - SUG:NA - DESC:fix CVE-2022-2845- Type:CVE - ID:CVE-2022-1725 - SUG:NA - DESC:fix CVE-2022-1725- Type:CVE - ID:CVE-2022-2598 CVE-2022-2571 - SUG:NA - DESC:fix CVE-2022-2598 CVE-2022-2571- Type:CVE - ID:CVE-2022-2522 - SUG:NA - DESC:fix CVE-2022-2522- Type:bugfix - ID:NA - SUG:NA - DESC:fix the error of backport-cannot-list-options-one-per-line.patch- Type:CVE - ID:CVE-2022-2343 - SUG:NA - DESC:fix CVE-2022-2343- Type:CVE - ID:CVE-2022-2289 - SUG:NA - DESC:fix CVE-2022-2289- Type:CVE - ID:CVE-2022-2210 - SUG:NA - DESC:fix CVE-2022-2210- Type:CVE - ID:CVE-2022-2264 CVE-2022-2257 CVE-2022-2286 CVE-2022-2287 - SUG:NA - DESC:fix CVE-2022-2264 CVE-2022-2257 CVE-2022-2286 CVE-2022-2287- Type:CVE - ID:CVE-2022-2000 CVE-2022-2042 CVE-2022-2284 CVE-2022-2285 CVE-2022-2304 CVE-2022-2344 CVE-2022-2345 - SUG:NA - DESC:fix CVE-2022-2000 CVE-2022-2042 CVE-2022-2284 CVE-2022-2285 CVE-2022-2304 CVE-2022-2344 CVE-2022-2345- Type:CVE - ID:CVE-2022-2207 CVE-2022-2208 - SUG:NA - DESC:fix CVE-2022-2207 CVE-2022-2208- Type:CVE - ID:CVE-2022-1720,CVE-2022-2183 - SUG:NA - DESC:fix CVE-2022-1720,CVE-2022-2183- Type:CVE - ID:CVE-2022-2125,CVE-2022-2206 - SUG:NA - DESC:fix CVE-2022-2125,CVE-2022-2206- Type:CVE - ID:CVE-2022-2126 - SUG:NA - DESC:fix CVE-2022-2126- Type:CVE - ID:CVE-2022-2175 - SUG:NA - DESC:fix CVE-2022-2175- Type:CVE - ID:CVE-2022-2124 - SUG:NA - DESC:fix CVE-2022-2124- Type:CVE - ID:CVE-2022-1771 - SUG:NA - DESC:fix CVE-2022-1771- Type:CVE - ID:CVE-2022-1897 CVE-2022-1968 - SUG:NA - DESC:fix CVE-2022-1897 CVE-2022-1968- Type:CVE - ID:CVE-2022-1851 CVE-2022-1898 CVE-2022-1942 - SUG:NA - DESC:fix CVE-2022-1851 CVE-2022-1898 CVE-2022-1942- Type:CVE - ID:CVE-2022-1886 - SUG:NA - DESC:fix CVE-2022-1886- Type:CVE - ID:CVE-2022-1927 - SUG:NA - DESC:fix CVE-2022-1927- Type:CVE - ID:CVE-2022-1785 - SUG:NA - DESC:fix CVE-2022-1785- Type:CVE - ID:CVE-2022-1796 - SUG:NA - DESC:fix CVE-2022-1796- Type:CVE - ID:CVE-2022-1733 CVE-2022-1735 - SUG:NA - DESC:fix CVE-2022-1733 CVE-2022-1735- Type:CVE - ID:CVE-2022-1629 CVE-2022-1620 CVE-2022-1674 CVE-2022-1621 CVE-2022-1619 - SUG:NA - DESC:fix CVE-2022-1629 CVE-2022-1620 CVE-2022-1674 CVE-2022-1621 CVE-2022-1619- Type:CVE - ID:CVE-2022-1154 - SUG:NA - DESC:fix CVE-2022-1154- Type:CVE - ID:CVE-2022-1616 - SUG:NA - DESC:fix CVE-2022-1616- Type:CVE - ID:CVE-2022-0943 - SUG:NA - DESC:fix CVE-2022-0943- Type:bugfix - ID:NA - SUG:NA - DESC:cve patch test cases are rectified- Type:CVE - ID:CVE-2022-0685 - SUG:NA - DESC:fix CVE-2022-0685- Type:CVE - ID:CVE-2022-0714CVE-2022-0729 - SUG:NA - DESC:fix CVE-2022-0714 CVE-2022-0729- Type:CVE - ID:CVE-2022-0629 - SUG:NA - DESC:fix CVE-2022-0629- Type:CVE - ID:CVE-2022-0572 - SUG:NA - DESC:fix CVE-2022-0572- Type:CVE - ID:CVE-2022-0319 CVE-2022-0554 - SUG:NA - DESC:fix CVE-2022-0319 CVE-2022-0554- Type:bugfix - ID:NA - SUG:NA - DESC:add make check- Type:CVE - ID:CVE-2022-0443 CVE-2022-0392 CVE-2022-0417 - SUG:NA - DESC:fix CVE-2022-0443 CVE-2022-0392 CVE-2022-0417- Type:CVE - ID:CVE-2022-0351 CVE-2022-0361 CVE-2022-0408 CVE-2022-0359 CVE-2022-0368 CVE-2022-0413 - SUG:NA - DESC:fix CVE-2022-0351 CVE-2022-0361 CVE-2022-0408 CVE-2022-0359 CVE-2022-0368 CVE-2022-0413- Type:bugfix - ID:NA - SUG:NA - DESC:fix garbled character display when file name matches- Type:CVE - ID:CVE-2022-0261 CVE-2022-0318 - SUG:NA - DESC:fix CVE-2022-0261 CVE-2022-0318- Type:CVE - ID:CVE-2022-0213 - SUG:NA - DESC:fix CVE-2022-0213- Type:CVE - ID:CVE-2021-4166 CVE-2021-4192 CVE-2021-4193 - SUG:NA - DESC:fix CVE-2021-4166 CVE-2021-4192 CVE-2021-4193- Type:CVE - ID:CVE-2021-4069 - SUG:NA - DESC:fix CVE-2021-4069- Type:CVE - ID:CVE-2021-4019 - SUG:NA - DESC:fix CVE-2021-4019- Type:CVE - ID:CVE-2021-3984 - SUG:NA - DESC:fix CVE-2021-3984- Type:CVE - ID:CVE-2021-3973 CVE-2021-3974 - SUG:NA - DESC:fix CVE-2021-3973 CVE-2021-3974- Type:CVE - ID:CVE-2021-3927 CVE-2021-3927 - SUG:NA - DESC:fix CVE-2021-3927 CVE-2021-3928- Type:CVE - ID:CVE-2021-3903 - SUG:NA - DESC:fix CVE-2021-3903- Type:CVE - ID:CVE-2021-3872 CVE-2021-3875 - SUG:NA - DESC:fix CVE-2021-3872 CVE-2021-3875- Type:CVE - ID:CVE-2021-3778 CVE-2021-3796 - SUG:NA - DESC:fix CVE-2021-3778 CVE-2021-3796- Type:CVE - ID:NA - SUG:NA - DESC:fix CVE-2021-3770obs-worker1640081563-aarch64-0008 1661946659 2:8.2-54.oe1autoloadcolorscompilerdocftdetectftpluginindentkeymaplangpluginprintspellsyntaxtutorautoloadcolorscompilerdoctagsftdetectftpluginindentkeymaplangpluginprintspellsyntaxtutor/usr/share/vim/vimfiles/after//usr/share/vim/vimfiles//usr/share/vim/vimfiles/doc/-O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -fstack-protector-strong -grecord-gcc-switches -specs=/usr/lib/rpm/openEuler/openEuler-hardened-cc1 -fasynchronous-unwind-tables -fstack-clash-protectionobs://private/openEuler:20.03:LTS:SP1/standard_aarch64/88d6d23c7b61591dd6c3556e4e11e7da-vimcpioxz2aarch64-openEuler-linux-gnudirectoryempty/oqTbutf-8c5861fdd8ccdc9d3f0a9d61922cdab6b1e7491626bd1d3dbf959a616f483fe5c?07zXZ !#,{Z] b2u jӫ`(y.S廛P[ּ _߭F{4?ؤdݯiȀ/5e 7ES7&2QN^r8@YZX)H`|c?^x1xj8 0¨9L/~KIr^5 %po*շ`rPA(;K'`IJG`9M֢v3o'M*3.ەaFwjmÎQ785(Qc76R`_,_4Z@zpV Ŗ7g`e:/IsH$'ʜAq2wxD!3`QԸ t`{~ Z4T YZ